Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Seven deadliest wireless technologie...
~
Haines, Brad.
Seven deadliest wireless technologies attacks
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Seven deadliest wireless technologies attacks/ Brad Haines ; technical editor, Tim Kramer.
Author:
Haines, Brad.
Published:
Burlington, MA :Syngress/Elsevier, : c2010.,
Description:
1 online resource (xvi, 122 p.) :ill. :
Subject:
Wireless communication systems - Security measures. -
Online resource:
http://www.sciencedirect.com/science/book/9781597495417
ISBN:
9781597495417
Seven deadliest wireless technologies attacks
Haines, Brad.
Seven deadliest wireless technologies attacks
[electronic resource] /Brad Haines ; technical editor, Tim Kramer. - Burlington, MA :Syngress/Elsevier,c2010. - 1 online resource (xvi, 122 p.) :ill. - Syngress seven deadliest attacks series. - Syngress seven deadliest attacks series..
Includes bibliographical references and index.
Introduction -- Chapter 1: 802.11 Wireless-Infrastructure Attacks -- Chapter 2: 802.11 Wireless-Client Attacks -- Chapter 3: Bluetooth Attacks -- Chapter 4: Credit Card, Access Card, and Passport Attacks -- Chapter 5: Analog Wireless Devices -- Chapter 6: Bad Encryption -- Chapter 7: Cell Phones / Smart Phones.
How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include: Bluetooth Attacks Credit Card, Access Card, and Passport Attacks Bad Encryption Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.
ISBN: 9781597495417
Source: 1094073:10885961Elsevier Science & Technologyhttp://www.sciencedirect.comSubjects--Topical Terms:
563496
Wireless communication systems
--Security measures.Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: TK5103.2 / .H325 2010
Dewey Class. No.: 005.8
Seven deadliest wireless technologies attacks
LDR
:02760cam 2200373Ia 4500
001
691465
003
OCoLC
005
20111122091344.0
006
m d
007
cr cn|||||||||
008
120103s2010 mauab ob 001 0 eng d
019
$a
688587526
020
$a
9781597495417
020
$a
1597495417
029
1
$a
AU@
$b
000045964047
029
1
$a
NZ1
$b
13448982
035
$a
(OCoLC)613958928
$z
(OCoLC)688587526
035
$a
ocn613958928
037
$a
1094073:10885961
$b
Elsevier Science & Technology
$n
http://www.sciencedirect.com
040
$a
OPELS
$b
eng
$c
OPELS
$d
CDX
$d
MUQ
$d
OCLCQ
$d
SFB
$d
OCLCQ
049
$a
TEFA
050
4
$a
TK5103.2
$b
.H325 2010
082
0 4
$a
005.8
$2
22
100
1
$a
Haines, Brad.
$3
596250
245
1 0
$a
Seven deadliest wireless technologies attacks
$h
[electronic resource] /
$c
Brad Haines ; technical editor, Tim Kramer.
260
$a
Burlington, MA :
$b
Syngress/Elsevier,
$c
c2010.
300
$a
1 online resource (xvi, 122 p.) :
$b
ill.
490
1
$a
Syngress seven deadliest attacks series
504
$a
Includes bibliographical references and index.
505
0
$a
Introduction -- Chapter 1: 802.11 Wireless-Infrastructure Attacks -- Chapter 2: 802.11 Wireless-Client Attacks -- Chapter 3: Bluetooth Attacks -- Chapter 4: Credit Card, Access Card, and Passport Attacks -- Chapter 5: Analog Wireless Devices -- Chapter 6: Bad Encryption -- Chapter 7: Cell Phones / Smart Phones.
505
0
$a
802.11 wireless--infrastructure attacks -- Wireless--client attacks -- Bluetooth attacks -- Radio frequency identification attacks -- Analog wireless devices -- Bad encryption -- Cell phones, personal digital assistants, and other hybrid devices.
520
$a
How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include: Bluetooth Attacks Credit Card, Access Card, and Passport Attacks Bad Encryption Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.
588
$a
Description based on print version record.
650
0
$a
Wireless communication systems
$x
Security measures.
$3
563496
650
0
$a
Computer networks
$x
Security measures.
$3
555385
650
0
$a
Computer security.
$3
557122
650
6
$a
R�eseaux d'ordinateurs.
$3
655358
650
6
$a
Transmission sans fil.
$3
655523
655
4
$a
Electronic books.
$2
local
$3
554714
830
0
$a
Syngress seven deadliest attacks series.
$3
813041
856
4 0
$3
ScienceDirect
$u
http://www.sciencedirect.com/science/book/9781597495417
938
$a
Coutts Information Services
$b
COUT
$n
14948503
994
$a
C0
$b
TEF
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login